Back to Search Start Over

A machine learning based approach to detect malicious android apps using discriminant system calls

Authors :
P. Vinod
Akka Zemmari
Mauro Conti
Laboratoire Bordelais de Recherche en Informatique (LaBRI)
Université de Bordeaux (UB)-Centre National de la Recherche Scientifique (CNRS)-École Nationale Supérieure d'Électronique, Informatique et Radiocommunications de Bordeaux (ENSEIRB)
Universita degli Studi di Padova
Source :
Future Generation Computer Systems, Future Generation Computer Systems, Elsevier, 2019, 94, pp.333-350. ⟨10.1016/j.future.2018.11.021⟩
Publication Year :
2019
Publisher :
HAL CCSD, 2019.

Abstract

The openness of Android framework and the enhancement of users trust have gained the attention of malware writers. The momentum of downloaded applications (app for short) from numerous app stores has stimulated the proliferation of mobile malware. Now the threat is due to the sophistication in malware being written to bypass signature-based detectors. In this paper, we investigate system calls to tackle mobile malware on Android operating system. To do so, we first employed machine learning to extract system calls. We then performed the empirical estimation of system calls derived from diverse datasets employing human interaction and random inputs. After accomplishing intensive experiments on synthesized system calls with two feature selection approach, namely Absolute Difference of Weighted System Calls (ADWSC) and Ranked System Calls using Large Population Test (RSLPT), we validated the results on five datasets. All classifiers generated in Area Under Curve of 1.0 with an accuracy exceeding 99.9% suggest the appropriateness and efficacy of the proposed approach. Finally, we evaluated the effectiveness of classifier against adversarial attacks and found that the classifiers are vulnerable to data poisoning and label flipping attacks. Adversarial examples created by poisoning malware samples resulted in the significant drop of classifier performance on perturbing 12–18 prominent attributes. Moreover, we implemented class label poisoning attacks which brought down the classification accuracy by 50% on altering labels of 50 malicious training instances.

Details

Language :
English
ISSN :
0167739X
Database :
OpenAIRE
Journal :
Future Generation Computer Systems, Future Generation Computer Systems, Elsevier, 2019, 94, pp.333-350. ⟨10.1016/j.future.2018.11.021⟩
Accession number :
edsair.doi.dedup.....ce69e22f78ea116c6b4c57d7db1c32a2